C. Curricula, Curriculum guidelines for undergraduate degree programs in cybersecurity, ACM Joint Task Force on Cybersecurity Education, 2017.

W. W. Agresti, The Four Forces Shaping Cybersecurity, Computer, vol.43, issue.2, pp.101-104, 2010.
DOI : 10.1109/MC.2010.53

J. Anderson, Computer security technology planning study, 1972.
DOI : 10.21236/ad0772806

URL : http://www.dtic.mil/cgi-bin/GetTRDoc?AD=AD0772806&Location=U2&doc=GetTRDoc.pdf

D. E. Bell and L. J. Lapadula, Secure computer system: Unified exposition and multics interpretation, 1976.
DOI : 10.21236/ADA023588

URL : http://www.dtic.mil/cgi-bin/GetTRDoc?AD=ADA023588&Location=U2&doc=GetTRDoc.pdf

R. W. Conway, W. L. Maxwell, and H. L. Morgan, On the implementation of security measures in information systems, Communications of the ACM, vol.15, issue.4, pp.211-220, 1972.
DOI : 10.1145/361284.361287

D. Craigen, N. Diakun-thibault, and R. Purse, Defining cybersecurity, Technology Innovation Management Review, vol.4, issue.10, pp.13-21835, 2014.

D. Denning, A lattice model of secure information flow, Communications of the ACM, vol.19, issue.5, pp.236-243, 1976.
DOI : 10.1145/360051.360056

C. W. Dukes, Committee on national security systems (cnss) glossary Committee on National Security Systems, 2015.

G. S. Graham and P. J. Denning, Protection, Proceedings of the November 16-18, 1971, fall joint computer conference on, AFIPS '71 (Fall), pp.417-429
DOI : 10.1145/1478873.1478928

M. Harrison, W. Ruzzo, and J. Ullman, Protection in operating systems, Communications of the ACM, vol.19, issue.8, pp.461-471, 1976.
DOI : 10.1145/360303.360333

L. J. Hoffman, The formulary model for flexible privacy and access controls, Proceedings of the May 16-18, 1972, spring joint computer conference on, AFIPS '72 (Spring), pp.587-601, 1972.
DOI : 10.1145/1479064.1479168

B. W. Lampson, Protection, ACM SIGOPS Operating Systems Review, vol.8, issue.1, pp.18-24, 1974.
DOI : 10.1145/775265.775268

J. Saltzer, Protection and the control of information sharing in multics, Communications of the ACM, vol.17, issue.7, pp.388-402, 1974.
DOI : 10.1145/361011.361067

W. Ware, Security controls for computer systems: Report of Defense Science Board Task Force on computer security, 1970.

C. Weissman, Security controls in the ADEPT-50 time-sharing system, Proceedings of the November 18-20, 1969, fall joint computer conference on, AFIPS '69 (Fall), pp.119-133, 1969.
DOI : 10.1145/1478559.1478574